Research Article
BibTex RIS Cite

Geo-Location Spoofing on E-Scooters; Threat Analysis and Prevention Framework

Year 2023, Volume: 11 Issue: 4, 364 - 372, 22.12.2023
https://doi.org/10.17694/bajece.1231384

Abstract

Geo-location services are widely used by numerous applications and devices. E-scooters have become one of the recent prevalent devices that uses these services. Geo-location services are highly vulnerable to spoofing attacks. Spoofing detection and prevention techniques have been researched for time. Most of the researches have been focused on smart devices such as smartphones, UAVs or other vehicles. Geo-location spoofing also poses significant threats on e-scooters for user security, costs and reliability. In this study, we analyze the location spoofing threats on e-scooter sharing environment and propose a spoofing detection framework. The proposed framework monitors e-scooter’s location and tracks significant changes. The proposed service based framework is able to provide different levels of awareness, and enabled capabilities.

References

  • [1] Jindal, K.; Dalal, S.; Sharma, K. K. “Analyzing Spoofing Attacks in Wireless Networks”. 2014 Fourth International Conference on Advanced Computing Communication Technologies: (February 2014), 398–402. doi:10.1109/ACCT.2014.46. ISBN 978-1-4799-4910- 6. S2CID 15611849.
  • [2] Getting the User’s Location, Apple Developer Documentation. [Online]. [Accessed: 10-Dec-2022]. Available: https://developer.apple.com/documentation/corelocation/gettingtheuserslocation.
  • [3] Geolocation API, Google. [Online]. [Accessed: 10-Dec-2022]. Available: https://developers.google.com/maps/documentation/geolocation/overview
  • [4] EUROPEAN GNSS (GALILEO) OPEN SERVICE Issue 2.0, January 2021 NAVIGATION SOLUTIONS POWERED BY EUROPE SIGNALIN-SPACE INTERFACE CONTROL DOCUMENT
  • [5] N. Vinayaga-Sureshkanth, R. Wijewickrama, A. Maiti, and M. Jadliwala, “Security and privacy challenges in upcoming Intelligent Urban Micromobility Transportation Systems,” Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, (2020). doi:10.1145/3375706.3380559
  • [6] A. S. Yılmaz, H. Çukurtepe and E. Kuğu, "Analysis of Location Spoofing Threats on E-Scooter Sharing," 2022 30th Signal Processing and Communications Applications Conference (SIU), Safranbolu, Turkey, 2022, pp. 1-4, doi: 10.1109/SIU55565.2022.9864946.
  • [7] Jovanovic, A., et al.: Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers. 2014 IEEE/ION Position, Location and Navigation Symposium (PLANS), (May 2014), pp. 43–49. doi:10.1109/PLANS.2014.6851501
  • [8] F. Formaggio, S. Ceccato, F. Basana, N. Laurenti, S. Tomasin, GNSS Spoofing Detection Techniques by Cellular Network Cross-check in Smartphones, in: Proceedings of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2019. doi:10.33012/2019.17076.
  • [9] Khan, F.; Al-Atawi, A.A.; Alomari, A.; Alsirhani, A.; Alshahrani, M.M.; Khan, J.; Lee, Y. Development of a Model for Spoofing Attacks in Internet of Things. Mathematics (2022), 10, 3686. https://doi.org/10.3390/math 10193686
  • [10] Tzeng C.L. Global Wi-Fi Enabled Devices Shipment Forecast, 2020–2024. Market Intelligence Consulting Institute (MIC); Taiwan, China: (2020)
  • [11] D. -K. Lee et al.,” Detection of GNSS Spoofing using NMEA Messages,” 2020 European Navigation Conference (ENC), (2020), pp. 1-10, doi: 10.23919/ENC48637.2020.9317470.
  • [12] Kexiong Curtis Zeng, Yuanchao Shu, Shinan Liu, Yanzhi Dou, and Yaling Yang. A Practical GPS Location Spoofing Attack in Road Navigation Scenario. In Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications (HotMobile ’17). Association for Computing Machinery, New York, NY, USA, (2017) 85–90. https://doi.org/10.1145/3032970.3032983
  • [13] Celestin M, Achara JP, Cunche M, “Short: Device-to-Identity Linking Attack Using Targeted Wi-Fi Geolocation Spoofing,”Acm Conference on Security Privacy in Wireless Mobile Networks, (2015). doi:10.1145/2766498.2766521
  • [14] R. V. Karpe and S. Kulkarni, “Software defined radio based Global Positioning System jamming and spoofing for vulnerability analysis,” 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), (2020). doi:10.1109/ICESC48915.2020.9155565
  • [15] Ma, Q.; Yang, H.; Mayhue, A.; Sun, Y.; Huang, Z.; Ma, Y. E-Scooter Safety: The Riding Risk Analysis Based on Mobile Sensing Data. Accid. Anal. Prev. (2021), 151, 105954. https://doi.org/10.1016/j.aap.2020.105954
  • [16] Yu, D. Y., Ranganathan, A., Locher, T., Capkun, S., Basin, D. Short paper: Detection of GPS spoofing attacks in power grids. WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (2014), 99–104. https://doi.org/10.1145/2627393.2627398
  • [17] Wang, K. Time and Position Spoofing with Open Source Projects. (2015).
  • [18] Meng, L., Yang, L., Yang, W., amp; Zhang, L. A survey of GNSS spoofing and anti-spoofing technology. Remote Sensing, 14(19), 4826, (2022). https://doi.org/10.3390/rs14194826
  • [19] Huang, J., Lo Presti, L., Motella, B., amp; Pini, M. GNSS spoofing detection: Theoretical Analysis and performance of the ratio test metric in open sky. ICT Express, 2(1), (2016), 37–40. https://doi.org/10.1016/j.icte.2016.02.006.
  • [20] Ye, A., Li, Q., Zhang, Q., Cheng, B. Detection of Spoofing Attacks in WLAN-Based Positioning Systems Using WiFi Hotspot Tags. IEEE Access, (2020), 8, 39768–39780. https://doi.org/10.1109/ACCESS.2020.2976189
Year 2023, Volume: 11 Issue: 4, 364 - 372, 22.12.2023
https://doi.org/10.17694/bajece.1231384

Abstract

References

  • [1] Jindal, K.; Dalal, S.; Sharma, K. K. “Analyzing Spoofing Attacks in Wireless Networks”. 2014 Fourth International Conference on Advanced Computing Communication Technologies: (February 2014), 398–402. doi:10.1109/ACCT.2014.46. ISBN 978-1-4799-4910- 6. S2CID 15611849.
  • [2] Getting the User’s Location, Apple Developer Documentation. [Online]. [Accessed: 10-Dec-2022]. Available: https://developer.apple.com/documentation/corelocation/gettingtheuserslocation.
  • [3] Geolocation API, Google. [Online]. [Accessed: 10-Dec-2022]. Available: https://developers.google.com/maps/documentation/geolocation/overview
  • [4] EUROPEAN GNSS (GALILEO) OPEN SERVICE Issue 2.0, January 2021 NAVIGATION SOLUTIONS POWERED BY EUROPE SIGNALIN-SPACE INTERFACE CONTROL DOCUMENT
  • [5] N. Vinayaga-Sureshkanth, R. Wijewickrama, A. Maiti, and M. Jadliwala, “Security and privacy challenges in upcoming Intelligent Urban Micromobility Transportation Systems,” Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, (2020). doi:10.1145/3375706.3380559
  • [6] A. S. Yılmaz, H. Çukurtepe and E. Kuğu, "Analysis of Location Spoofing Threats on E-Scooter Sharing," 2022 30th Signal Processing and Communications Applications Conference (SIU), Safranbolu, Turkey, 2022, pp. 1-4, doi: 10.1109/SIU55565.2022.9864946.
  • [7] Jovanovic, A., et al.: Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers. 2014 IEEE/ION Position, Location and Navigation Symposium (PLANS), (May 2014), pp. 43–49. doi:10.1109/PLANS.2014.6851501
  • [8] F. Formaggio, S. Ceccato, F. Basana, N. Laurenti, S. Tomasin, GNSS Spoofing Detection Techniques by Cellular Network Cross-check in Smartphones, in: Proceedings of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2019. doi:10.33012/2019.17076.
  • [9] Khan, F.; Al-Atawi, A.A.; Alomari, A.; Alsirhani, A.; Alshahrani, M.M.; Khan, J.; Lee, Y. Development of a Model for Spoofing Attacks in Internet of Things. Mathematics (2022), 10, 3686. https://doi.org/10.3390/math 10193686
  • [10] Tzeng C.L. Global Wi-Fi Enabled Devices Shipment Forecast, 2020–2024. Market Intelligence Consulting Institute (MIC); Taiwan, China: (2020)
  • [11] D. -K. Lee et al.,” Detection of GNSS Spoofing using NMEA Messages,” 2020 European Navigation Conference (ENC), (2020), pp. 1-10, doi: 10.23919/ENC48637.2020.9317470.
  • [12] Kexiong Curtis Zeng, Yuanchao Shu, Shinan Liu, Yanzhi Dou, and Yaling Yang. A Practical GPS Location Spoofing Attack in Road Navigation Scenario. In Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications (HotMobile ’17). Association for Computing Machinery, New York, NY, USA, (2017) 85–90. https://doi.org/10.1145/3032970.3032983
  • [13] Celestin M, Achara JP, Cunche M, “Short: Device-to-Identity Linking Attack Using Targeted Wi-Fi Geolocation Spoofing,”Acm Conference on Security Privacy in Wireless Mobile Networks, (2015). doi:10.1145/2766498.2766521
  • [14] R. V. Karpe and S. Kulkarni, “Software defined radio based Global Positioning System jamming and spoofing for vulnerability analysis,” 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), (2020). doi:10.1109/ICESC48915.2020.9155565
  • [15] Ma, Q.; Yang, H.; Mayhue, A.; Sun, Y.; Huang, Z.; Ma, Y. E-Scooter Safety: The Riding Risk Analysis Based on Mobile Sensing Data. Accid. Anal. Prev. (2021), 151, 105954. https://doi.org/10.1016/j.aap.2020.105954
  • [16] Yu, D. Y., Ranganathan, A., Locher, T., Capkun, S., Basin, D. Short paper: Detection of GPS spoofing attacks in power grids. WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (2014), 99–104. https://doi.org/10.1145/2627393.2627398
  • [17] Wang, K. Time and Position Spoofing with Open Source Projects. (2015).
  • [18] Meng, L., Yang, L., Yang, W., amp; Zhang, L. A survey of GNSS spoofing and anti-spoofing technology. Remote Sensing, 14(19), 4826, (2022). https://doi.org/10.3390/rs14194826
  • [19] Huang, J., Lo Presti, L., Motella, B., amp; Pini, M. GNSS spoofing detection: Theoretical Analysis and performance of the ratio test metric in open sky. ICT Express, 2(1), (2016), 37–40. https://doi.org/10.1016/j.icte.2016.02.006.
  • [20] Ye, A., Li, Q., Zhang, Q., Cheng, B. Detection of Spoofing Attacks in WLAN-Based Positioning Systems Using WiFi Hotspot Tags. IEEE Access, (2020), 8, 39768–39780. https://doi.org/10.1109/ACCESS.2020.2976189
There are 20 citations in total.

Details

Primary Language English
Subjects Software Testing, Verification and Validation
Journal Section Araştırma Articlessi
Authors

Ahmet Saim Yılmaz 0000-0002-4279-684X

Haydar Cukurtepe 0000-0002-4670-4877

Emin Kugu 0000-0001-7829-8087

Early Pub Date January 25, 2024
Publication Date December 22, 2023
Published in Issue Year 2023 Volume: 11 Issue: 4

Cite

APA Yılmaz, A. S., Cukurtepe, H., & Kugu, E. (2023). Geo-Location Spoofing on E-Scooters; Threat Analysis and Prevention Framework. Balkan Journal of Electrical and Computer Engineering, 11(4), 364-372. https://doi.org/10.17694/bajece.1231384

All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.Creative Commons Lisansı